RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-07 Thread Charlie Wehner

I just ran both of the hashes against a 20Mb wordlist using John the Ripper
with no luck.  (Looks like you might have to perform some password recovery.)


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40753&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-05 Thread Robert Fowler

Boson has some free utilities that include a password breaker. IT won't work
if you have the high level encryption enabled. Someone posted some equipment
for sale once on e-bay. They gave a limited logon, and did a show config. I
cracked the password utility with the boson cracker and when it prompted for
a password for higher level stuff I entered it and it worked. I didn't do
anything to the machine of course, and I did let the seller know. But most
people are aware of it. Also another common password I found is the company
name. 

Robert

-Original Message-
From: Tom Monte [mailto:[EMAIL PROTECTED]] 
Sent: Thursday, April 04, 2002 4:48 PM
To: [EMAIL PROTECTED]
Subject: RE: Can anyone break this Cisco 4912G password? [7:40505]

It is possible to break a Cisco IOS password.  I had a piece of software on
my Palm Pilot that does it, but I left it home.  :(  I know there are alot
of others and there was a website that did it at one point.  Cisco password
encryption isn't that strong.  I would try "password", "cisco" and the name
of your company before you go any further.  If you know something about the
person who set it up, you could try things related to them.  People tend to
pick there children or a favorite sport as a password or simply ask him or
her if they are available.  I will look around and see if I can find
something to break them for you.

-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]


I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want to go through the Password Recovery Procedure on this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70
This e-mail and any files transmitted with it are intended solely for
the person(s) to whom it is addressed.  If you are not the intended
recipient, please delete the message and all copies of it from
your system, destroy any hard copies of it and contact the sender
by return e-mail.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40579&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Lomker, Michael

By the way, Solarwinds also sells a commercial (Windows) product that also
handles configs via SNMP: their Cisco config uploader/downloader.  They
offer a 30-day demo (crippled, of course) but I liked it enough to buy a
copy:

http://www.solarwinds.net/tools.htm




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40533&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Lomker, Michael

> switch. I don't want to go through the Password Recovery 
> Procedure on this production switch. Can you help?

I assume that you don't have SNMP enabled with read/write?  That way you'd
only need the community string to reset the password.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40524&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Tom Monte

It is possible to break a Cisco IOS password.  I had a piece of software on
my Palm Pilot that does it, but I left it home.  :(  I know there are alot
of others and there was a website that did it at one point.  Cisco password
encryption isn't that strong.  I would try "password", "cisco" and the name
of your company before you go any further.  If you know something about the
person who set it up, you could try things related to them.  People tend to
pick there children or a favorite sport as a password or simply ask him or
her if they are available.  I will look around and see if I can find
something to break them for you.

-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]


I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want to go through the Password Recovery Procedure on this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70
This e-mail and any files transmitted with it are intended solely for
the person(s) to whom it is addressed.  If you are not the intended
recipient, please delete the message and all copies of it from
your system, destroy any hard copies of it and contact the sender
by return e-mail.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40531&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Steve Smith

DOH! Copied the wrong thangy!

-Original Message-
From: Ole Drews Jensen [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:53 PM
To: Steve Smith; [EMAIL PROTECTED]
Subject: RE: Can anyone break this Cisco 4912G password? [7:40505]


The password you cracked Steve, was the example they had on the site you
found the password cracker :-)

Ole

~
 Ole Drews Jensen
 Systems Network Manager
 CCNP, MCSE, MCP+I
 RWR Enterprises, Inc.
 [EMAIL PROTECTED]
~
 http://www.RouterChief.com
~
 Need a Job?
 http://www.OleDrews.com/job
~




-Original Message-
From: Steve Smith [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:27 PM
To: [EMAIL PROTECTED]
Subject: RE: Can anyone break this Cisco 4912G password? [7:40505]


its time to go to lunch

who knows the other one.


-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 1:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]


I have forgotten the enable level password on this Cisco 4912G Catalyst
OS
switch. I don't want to go through the Password Recovery Procedure on
this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40523&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Patrick Ramsey

well after reading up on cisco's site, that switch is not vulnerable...their
list of vulnerable switches are as follows

700 series dialup routers (750, 760, and 770 series) are not affected. 
Catalyst 1900, 2800, 2900, 3000, and 5000 series LAN switches are not
affected. However, optional router modules running Cisco IOS software in
switch backplanes, such as the RSM module for the Catalyst 5000 and 5500,
are affected (see the Affected Products section above).
The Catalyst 6000 is not affected if it is not running IOS. 
WAN switching products in the IGX and BPX lines are not affected. 
The MGX (formerly known as the AXIS shelf) is not affected. 
No host-based software is affected. 
The Cisco PIX Firewall is not affected. 
The Cisco LocalDirector is not affected. 
The Cisco Cache Engine is not affected

>>> "Patrick Ramsey"  04/04/02 03:58PM >>>
have you tried the http exploit?

>>> "Patrick Ramsey"  04/04/02 03:44PM >>>
does it run ios?  I've never dealt with that make...is http enabled?

-Patrick

>>> "Orlosky, Glenn M"  04/04/02 02:09PM >>>
I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want to go through the Password Recovery Procedure on this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70
>  Confidentiality Disclaimer     Confidentiality
Disclaimer     Confidentiality Disclaimer    
Confidentiality Disclaimer     Confidentiality Disclaimer  

This email and any files transmitted with it may contain confidential and
/or proprietary information in the possession of WellStar Health System,
Inc. ("WellStar") and is intended only for the individual or entity to whom
addressed.  This email may contain information that is held to be
privileged, confidential and exempt from disclosure under applicable law. If
the reader of this message is not the intended recipient, you are hereby
notified that any unauthorized access, dissemination, distribution or
copying of any information from this email is strictly prohibited, and may
subject you to criminal and/or civil liability. If you have received this
email in error, please notify the sender by reply email and then delete this
email and its attachments from your computer. Thank you.






Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40521&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Ole Drews Jensen

The password you cracked Steve, was the example they had on the site you
found the password cracker :-)

Ole

~
 Ole Drews Jensen
 Systems Network Manager
 CCNP, MCSE, MCP+I
 RWR Enterprises, Inc.
 [EMAIL PROTECTED]
~
 http://www.RouterChief.com
~
 Need a Job?
 http://www.OleDrews.com/job
~




-Original Message-
From: Steve Smith [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 2:27 PM
To: [EMAIL PROTECTED]
Subject: RE: Can anyone break this Cisco 4912G password? [7:40505]


its time to go to lunch

who knows the other one.


-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 1:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]


I have forgotten the enable level password on this Cisco 4912G Catalyst
OS
switch. I don't want to go through the Password Recovery Procedure on
this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40520&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Patrick Ramsey

have you tried the http exploit?

>>> "Patrick Ramsey"  04/04/02 03:44PM >>>
does it run ios?  I've never dealt with that make...is http enabled?

-Patrick

>>> "Orlosky, Glenn M"  04/04/02 02:09PM >>>
I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want to go through the Password Recovery Procedure on this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70
>  Confidentiality Disclaimer     Confidentiality
Disclaimer     Confidentiality Disclaimer   
This email and any files transmitted with it may contain confidential and
/or proprietary information in the possession of WellStar Health System,
Inc. ("WellStar") and is intended only for the individual or entity to whom
addressed.  This email may contain information that is held to be
privileged, confidential and exempt from disclosure under applicable law. If
the reader of this message is not the intended recipient, you are hereby
notified that any unauthorized access, dissemination, distribution or
copying of any information from this email is strictly prohibited, and may
subject you to criminal and/or civil liability. If you have received this
email in error, please notify the sender by reply email and then delete this
email and its attachments from your computer. Thank you.






Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40519&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Patrick Ramsey

does it run ios?  I've never dealt with that make...is http enabled?

-Patrick

>>> "Orlosky, Glenn M"  04/04/02 02:09PM >>>
I have forgotten the enable level password on this Cisco 4912G Catalyst OS
switch. I don't want to go through the Password Recovery Procedure on this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70
>  Confidentiality Disclaimer   
This email and any files transmitted with it may contain confidential and
/or proprietary information in the possession of WellStar Health System,
Inc. ("WellStar") and is intended only for the individual or entity to whom
addressed.  This email may contain information that is held to be
privileged, confidential and exempt from disclosure under applicable law. If
the reader of this message is not the intended recipient, you are hereby
notified that any unauthorized access, dissemination, distribution or
copying of any information from this email is strictly prohibited, and may
subject you to criminal and/or civil liability. If you have received this
email in error, please notify the sender by reply email and then delete this
email and its attachments from your computer. Thank you.






Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40516&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Steve Smith

its time to go to lunch

who knows the other one.


-Original Message-
From: Orlosky, Glenn M [mailto:[EMAIL PROTECTED]]
Sent: Thursday, April 04, 2002 1:10 PM
To: [EMAIL PROTECTED]
Subject: Can anyone break this Cisco 4912G password? [7:40505]


I have forgotten the enable level password on this Cisco 4912G Catalyst
OS
switch. I don't want to go through the Password Recovery Procedure on
this
production switch. Can you help?

Thanks
Glenn


set password $1$0o8Z$yoRgp68KqY9Qi1Hi9mu8s0
set enablepass $1$FMFQ$HfZR5DUszVHIRhrz4h6V70




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40513&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Can anyone break this Cisco 4912G password? [7:40505]

2002-04-04 Thread Darren Sargent

Password recovery time mate.


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=40506&t=40505
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]